HOLY MARY INSTITUTE OF TECHNOLOGY & SCIENCE
(UGC-Autonomous)
(Approved by AICTE, New Delhi, and Permanent Affiliation to JNTUH, Accredited by NAAC-A)
Bogaram (V), Keesara (M), Medchal (Dist), Hyderabad, Telangana State
SUBJECT: SOFTWARE ENGINEERING
1. Match the following.
1 Waterfall model a Specifications can be developed incrementally
2 Evolutionary model b Requirements compromises are inevitable
3 Component – based software engineering c Explicit recognition of risk
4 Spiral development d Inflexible partitioning of the project into
stages
a. 1-a, 2-b, 3-c, 4-d b. 1-d, 2-a, 3-b, 4-c
c. 1- d, 2-b, 3-a, 4-c d. 1- c, 2-a, 3-b, 4-d
2. A stage in which individual components are integrated and ensured that they are error-free to meet
customer requirements.
a. Coding b. Testing
c. Design d. Implementation
3. The waterfall model of software development is
a. A reasonable approach when requirements are well defined
b. A good approach when a working program is required quickly.
c. The best approach to use for projects with large development teams
d. An old-fashioned model that is rarely used any more
4. Which of these is not one of the phase names defined by the Unified Process model for software
development?
a. Inception phase b. Elaboration phase
c. Construction phase d. Validation phase
5. Which of the following is not a phase of CMMI?
a. Initial b. Quantitatively managed
c. Integrated d. Defined
6. What is the full form of CMMI?
a. Capability Maturity Modification integration b. Capability Managed Maturity Integration
c. Capability Maturity Model Integrator d. Capability Maturity Model Integration
7. Which of the following are characteristics of incremental integration model?
1. Defects are easy to detect
2.All the modules are required to be completed before integration testing starts.
3. It is time consuming
4.Stubs and drivers are used
a. 2,4 b. 1,3,4
c. 1,2,4 c. All of the above
8. UML diagram cannot be used to capture which of the following views?
a. Layer view b. User view
c. Structural view d. None
9. In which of the following categories can white-box testing be classified?
a. Design based testing b. Structural testing
c. Error guessing technique d. None of the above
10. On which of the following is Agile Software Development based?
a. Linear development b. Incremental development
c. Iterative development d. Both Incremental and Iterative development
11. “Consider a system where, a heat sensor detects an intrusion and alerts the security company.” What
kind of a requirement the system is providing?
a. Functional b. Non-Functional
c. Known Requirement d. None of the mentioned
12. Choose the incorrect statement with respect to Non-Functional Requirement(NFR).
a. Product-oriented Approach – Focus on system (or software) quality
b. Process-oriented Approach – Focus on how NFRs can be used in the design process
c. Quantitative Approach – Find measurable scales for the functionality attributes
d. Qualitative Approach – Study various relationships between quality goals
13. The best way to conduct a requirements validation review is to
a. examines the system model for errors
b. has the customer look over the requirements
c. sends them to the design team and see if they have any concerns
d. uses a checklist of questions to examine each requirement
14. The use of traceability tables helps to
a. debug programs following the detection of run-time errors
b. determine the performance of algorithm implementations
c. identify, control, and track requirements changes
d. none of the above
15. The result of the requirements engineering task is an analysis model that defines which of the
following problem domain(s)?
a. information b. functional
c. behavioral d. all of the above
16. In collaborative requirements gathering the facilitator
a. arranges the meeting place b. cannot be a customer
c. controls the meeting d. must be an outsider
17. Milestones are used to ?
a. Know the cost of the project b. Know the status of the project
c. Know the user expectations d. None of the above
18. Who proposed the spiral model?
a. Barry Boehm b. Pressman
c. Royce d. IBM
19. Who proposed Function Points?
a. Albrecht b. Jacobson
c. Boehm d. Booch
20. What is the full form of the “COCOMO” model?
a. Cost Constructive Estimation Model b. Constructive Cost Estimation Model
c. Constructive Case Estimation Model d. Constructive Cost Estimating Model
21. "Three statements are given below regarding the User Interface Design,
1. Place the user in control.
2. Reduce the user’s memory load.
3. Make the interface consistent.
These rules are called as __________."
a. Golden Rule b. Silver Rule
c. User Rule d. Interface Rule
22. Which model in system modelling depicts the dynamic behaviour of the system ?
a. Context Model b. Behavioral Model
c. Data Model d. Object Model
23. Which diagram of UML represent Interaction modeling?
a. Use Case b. Sequence
c. State Chart d. Both A and B
24. Which of the following are valid step in SDLC framework?
a. Requirement Gathering b. System Analysis
c. Software Design d. All of the above
25. Automation testing, which is also known as ?
a. Test Design b. Test Automation
c. Test Process d. Automation Testing
26. Which of the following is a common technique used in white box testing?
a. Boundary value analysis b. Random testing
c. Path testing d. Usability testing
27. What type of errors can White Box Testing help identify?
a. User Interface bugs b. Logical errors and security flaws
c. Syntax errors d. Only memory leaks
28. What is the primary goal of Black Box Testing?
a. To validate the internal code structure b. To find security vulnerabilities
c. To verify the functionality of the software d. To review the source code
29. What is the main difference between Black Box Testing and White Box Testing?
a. Black Box Testing focuses on internal code; White Box Testing focuses on external behavior
b. There is no difference between the two testing types
c. White Box Testing is for functional testing; Black Box Testing is for security testing
d. Black Box Testing does not require knowledge of code; White Box Testing does
30. The process of finding and fixing bugs is termed?
a. Exception b. Bugs handling
c. Debugging d. Error handling
31. Which of the following is not bug tracking tools?
a. Jira b. Yelzilla
c. Redmine d. Backlog
32. Function Point Computation is given by the formula
a. FP = [count total * 0.65] + 0.01 * sum(Fi) b. FP = count total * [0.65 + 0.01 * sum(Fi)]
c. FP = count total * [0.65 + 0.01] * sum(Fi) d. FP = [count total * 0.65 + 0.01] * sum(Fi)
33. Size and Complexity are a part of
a. Product Metrics b. Process Metrics
c. Project Metrics d. None of the above
34. ___ provide information on the ease or difficulty associated with integration testing.
a. Product metrics b. Work products
c. Architectural design metrics d. All of the mentioned above
35. The intent of project metrics is:
a. minimization of development schedule
b. for strategic purposes
c. assessing project quality on ongoing basis
d. minimization of development schedule and assessing project quality on ongoing basis
36. How is throwaway prototype different from evolutionary prototype ?
a. It involves successive steps
b. It involves just one task
c. The prototype is built with the idea that it will eventually be converted into final system
d. It has a shorter development time
37. Risk management is one of the most important jobs for a
a. Client b. Investor
c. Production team d. Project manager
38. What assess the risk and your plans for risk mitigation and revise these when you learn more about
the risk?
a. Risk monitoring b. Risk planning
c. Risk analysis d. Risk identification
39. What threatens the quality and timeliness of the software to be produced?
a. Known risks b. Business risks
c. Project risks d. Technical risks
40. How does a risk management plan contribute to project success?
a. By eliminating all project risks
b. By mitigating all identified risks
c. By providing a structured approach to identify, assess, and manage risks
d. By avoiding risks entirely
41. What is Six Sigma?
a. It is the most widely used strategy for statistical quality assurance
b. The “Six Sigma” refers to six standard deviations
c. It is the most widely used strategy for statistical quality assurance AND The “Six Sigma” refers to six
standard deviations
d. A Formal Technical Review(FTR) guideline for quality walkthrough or inspection
42. Which of the following is not a key component of software quality management?
a. Quality planning b. Quality control
c. Quality assurance d. Quality implementation
43. Which of the following is a type of software quality assurance?
a. Project management b. Requirements gathering
c. Code review d. Customer support
44. Quality Management in software engineering is also known as
a. SQA b. SQM
c. SQI d. SQA and SQM
45. How many phases are there in Brainstorming ?
a. Two b. Three
c. Four d. All the above
46. Case tools are classified often as
a. Classical and modern CASE tools b. Upper and lower CASE tools
c. Source and object CASE tools d. Object oriented structured CASE tools
47. Identify the testing tool which does not support by Database Testing?
a. Finding broken code b. A stage of all Projects
c. Evaluating deliverables to find errors d. None of the above
48. Beta Testing is done by
a. Developers b. Testers
c. Users d. All of the above
49. The major drawback of RAD model is __________.
a. It requires highly skilled developers/designers. b. It necessitates customer feedbacks.
c. It increases the component reusability. d. Both (a) & (c)
50. What is the major drawback of the Spiral Model?
a. Higher amount of risk analysis
b. Doesn't work well for smaller projects
c. Additional functionalities are added later on
d. Strong approval and documentation control